It isn't pretty but: dd if=/dev/wd1a skip=8244 bs=1 count=4 | hexdump -C 4+0 records in 4+0 records out 4 bytes transferred in 0.001 secs (3263 bytes/sec) 00000000 41 00 00 00 |A...| 00000004
wd1a is the cooked RAID partition. In this case this is an AOE target. If it was crypto it would have been 4c 00 00 00 |C...| Currently the possible values are: 0x00 (RAID 0), 0x01 (RAID 1), 0x41 (AOE target), 0x4c (CRYPTO) & 0x61 (AOE initiator). Note that softraid is not endian neutral so on big endian machines the numbers are flipped. FWIW, /marco On Fri, Dec 12, 2008 at 01:33:14PM +0100, Michael wrote: > Todd T. Fries schrieb: > > tried > > > > bioctl -h softraid0 > > lately? > > > Well, yes... but it only works if I already activated the softraid device... > > # bioctl -h softraid0 > Volume Status Size Device > softraid0 0 Online 3.8G sd1 CRYPTO > 0 Online 3.8G 0:0.0 noencl <sd0a> > # bioctl -d sd1 > # bioctl -h softraid0 > > > ...but I would like to know what kind of type sd0a is before I try to use > > bioctl -c [01C] -l /dev/... softraid0 > > to be able to use bioctl from a script, only for CRYPTO. > > Only other way I currently see is to set the label from disklabel of sd0 > to some name and check what to do from that information.